Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (693)
  • Article (160)
  • News (135)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 90 91 92 93 94 95 96 97 98 99 Next »

15%
Ansible collections simplify AIX automation
05.08.2024
Home »  Archive  »  2024  »  Issue 82: Sover...  » 
Lead Image © alexutemov, 123RF.com
to read "Intro to Playbooks" [13] on the Ansible website. Put simply, Ansible Playbooks are a way to use commands to perform operations on remote computers in a scripted manner. An Ansible Playbook contains
15%
Securing the container environment
01.06.2024
Home »  Archive  »  2024  »  Issue 81: Load...  » 
Lead Image © zeferli, 123RF.com
. To scan all pods vulnerable to remote code execution (RCE) , run one of the commands kubeletctl scan rce --server 3.71.72.105 -i kubeletctl scan rce --cidr 3.71.72.0/24 -i The next example runs a command
15%
Kea, the ISC's successor to the DHCP daemon
03.08.2023
Home »  Archive  »  2023  »  Issue 76: Energ...  » 
Photo by Markus Winkler on Unsplash
-socket block defines the "remote control." This Unix domain socket supports commands from Kea's REST API. With a tool like socat, you can send API commands directly in JSON format if needed. The Kea Control
15%
Protecting your web application infrastructure with the Nginx Naxsi firewall
18.07.2013
Home »  Archive  »  2013  »  Issue 15: What’...  » 
Pansiri Pikunkaew, 123RF
:BODY|URL|ARGS|$HEADERS_VAR:Cookie" "s:$SQL:8" id:1003 ; Core Ruleset Naxsi comes with its own core ruleset; it contains generic signatures for SQL Injection (SQLi), Remote File Inclusions (RFIs), directory traversal, cross
15%
Resolving problems with DNS, Active Directory, and Group Policy
17.04.2017
Home »  Archive  »  2017  »  Issue 38: .NET...  » 
Lead Image © Fernando Gregory, 123RF.com
, but the remote server 10.0.0.11, you can enter in the nslookup command to query a different DNS server. The nslookup tool launches at the command prompt and is configured to use DNS server 10
15%
Network access control with Cisco's Identity Services Engine
07.04.2022
Home »  Archive  »  2022  »  Issue 68: Autom...  » 
Photo by Keith Hardy on Unsplash
in line with a stored ruleset. The Passive Identity service now also supports the Microsoft Remote Procedure Call (MSRPC) protocol, and an on-demand health check of all nodes in the ISE is present
15%
Automating deployments on Proxmox with OpenTofu and cloud-init
04.12.2024
Home »  Articles  » 
Lead Image © lightwise, 123RF.com
"$REMOTE_ADDR" 16 match request header set "X-Forwarded-Port" value "$SERVER_PORT" 17 match request header set "X-Forwarded-By" value "$SERVER_ADDR:$SERVER_PORT" 18 } 19 20 relay
15%
ASM tools and strategies for threat management
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Lead Image © tarokichi, 123RF.com
, or remote maintenance access are increasingly being set up in the scope of Industry 4.0, and an ASM system would, one hopes, find them. According to Strobel, however, these problems are peripheral, saying
15%
Comparing 5 to 50TB NAS storage boxes
31.10.2025
Home »  Archive  »  2012  »  Issue 12: NAS S...  » 
© Franck Boston, fotolia.com
, geographically remote StorCenter. At least this kind of centralized storage on the web is a useful thing to have for smaller businesses or branch offices, given that it avoids a subscription fee and keeps access
15%
Get the best out of your bandwidth with tc
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
© Russell Shively, 123RF.com
a remote application that reacts differently to how much bandwidth is available for your Internet connection. Using tc, it is possible to alter your throughput quickly with a (relatively long) single command

« Previous 1 ... 90 91 92 93 94 95 96 97 98 99 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice